----- Original Message -----
> On 12/14/2011 10:58 AM, Simo Sorce wrote:
> > ----- Original Message -----
> >>>>> We can also generate the SID algorithmically from the
> >>>>> uidNumber/gidNumber
> >>>> Do you mean the SID of the trusted domain user?
> >>> No I meant the SID of users and groups.
> >> ok, I would very much favor this approach it will make things much
> >> easier. But iirc the idea was rejected some time ago, because we
> >> couldn't agree on a good algorithm which can remove the conflicts
> >> when
> >> uid and gid are the same. What would you suggest? Adding the
> >> highest
> >> bit
> >> for groups? uid*2 for users, (gid*2)+1 for groups? ... ?
> > Good question.
> >
> > So we need to decide whether we want algorithmic mapping or not (or
> > a hybrid).
> >
> > Advantages of fixed NT SIDs:
> > - Full control of users and group SIDs, you can simply remove a SID
> > to make the user or the group unavailable wrt Windows
> > compatibility (reduce PAC size and so on)
> > - Do not change if the admin needs to change uidNumber or gidNumber
> > for whatever reason.
> > - Easy to search by SID, does not require guessing what the
> > corresponding uid/gid are.
> > - SIDs can be applied also to non-user/group objects w/o having to
> > waste a uidNumber
> > - No risk of conflicts if admins decide not to use UPGs and have
> > unrelated groups and user that happen to algorithmically end up
> > with the same SID (or force us to waste space to assure all groups
> > have even RIDs and users odd RIDs)
> >
> > Disadvantages of fixed NT SIDs:
> > - Requires DNA plugin to assign values since first install
> > - Requires manual assignment, or fixup task if feature is activated
> > after a consistent number of users/groups have been created.
> > - third parties that have to do SID -> UID mapping on their own
> > (think a samba server joined to the AD side and that has no
> > knowledge these SIDs belong to an IPA domain) may get different
> > SID -> UID mappings.
> >
> >
> > I think the points above suggest we should indeed stick with the
> > original decision of storing the SID and not go algorithmic
> > (although the last point may be slightly annoying, it could be
> > easily solved by forcing mappings on the other side or giving them
> > read access to the IPA LDAP server for mapping purposes).
> >
> > The main issue is that we cannot assume DNA is configured from
> > first install because an upgrade from v2 to v3 will simply go
> > against it.
> > But a fixup task to handle the situation shouldn't be too bad.
> > The hardest problem will be to insure all servers that create
> > users/groups have the DNA plugin properly configured. And a
> > secondary, very minor, annoyance is that we will have to assign a
> > range for SIDs as well.
> > But this is not too hard we should probably just always assign a
> > 200k IDs starting from 2000 or so. We do not need a random range
> > because SIDs are unique across domains so we do not need to fear
> > any collisions on trust relationships. So this part is easy. We
> > limit initially to 1 Million only to keep RIDs in a very low
> > range, so that mapping SIDs to UID/GID numbers for 3rd parties is
> > not going to be problematic.
> > If we assigne a larger range like 2Billion the as soon as you
> > install a replica and create users there the range will be split
> > in 2 and users create from that other replica will have their RID
> > starting at 1Billion (as the range is split in 2 between the 2
> > replicas) which will make life difficult if someone want to limit
> > SID ranges for posix mapping purposes.
> >
> > Simo.
> >
> With the static IDs you will have an issue with DNA that you will
> have
> to implement 2 dimensional slicing if ranges. Right now the ranges
> are
> sliced per replica and traded accordingly. With your proposal the DNA
> would have to deal with a concept of group of ranges belonging to
> each
> domain and make sure that every replica has its slice for the group.
> I
> seems that it would require changes to the DNA plugin logic, not only
> configuration.
> Also the point about third parties IMO is just a showstopper. If we
> go
> with static IDs nobody would deploy us as we are nonexistent in real
> deployments while samba and other solutions are already deployed in
> multiple places. Poeple will be very frustrated to find out that our
> ids
> do not match.
> 
> Man ye we should do our own samba id mapping back end that would work
> like idmap_rid but factor in configured range and contribute it to
> samba.
> 
> But the problem of the collisions already exists  with samba when
> multiple domains are in play so I really do not understand why we
> should
> try to solve the problem that is pretty much unsolvable.

I think you are confusing 2 problems here.
1 problem (the one you have in mind) is mapping foreign SIDs from AD
domains to uid/gids, this is NOT the problem we are discussing here.

What we are discussing here is how to generate the SIDs for our own
domain, for consumption by AD clients.

Simo.

_______________________________________________
Freeipa-devel mailing list
Freeipa-devel@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-devel

Reply via email to